Cyber Threat Intelligence Team Lead
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, IT Project Manager
Get AI‑powered advice on this job and more exclusive features.
This range is provided by Control Risks. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range$/yr - $/yr
The Cyber Threat Intelligence Team Lead will play a pivotal role in building and leading a world‑class Cyber Intelligence program for a major client of Control Risks. This role will be responsible for developing the strategy, building out capabilities, and leading a team of security professionals to proactively detect, triage, and respond to cyber threats.
This position provides technical direction and administrative oversight on all cybersecurity matters, ensuring the protection of the client’s systems, networks, and data. The manager supports a strong first‑line ownership model by partnering with technology and business stakeholders to embed security into planning, development, and operational activities.
Responsibilities- Working closely with client stakeholders, build, manage, and scale a Cyber Threat Intelligence Team from the ground up.
- Lead on developing standard operating procedures for threat intelligence activities, taking into account specific client activities and stakeholders, such as tooling, reporting lines, and out‑of‑hours incidents.
- Lead on managing the most severe and critical cyber security incidents, including supporting incident responders with reporting, updates and investigations to aid incident response and crisis management in a timely, accurate, and professional manner.
- Train and mentor threat intelligence analysts, engineers, and threat hunters.
- Establish operational processes, escalation paths, and playbooks.
- Oversee the triage of cyber events, ensuring rapid identification, investigation, and remediation.
- Manage incident response activities, coordinating across IT, Legal, Risk, and other stakeholders.
- Develop metrics, KPIs, and reporting to measure SOC effectiveness.
- Lead proactive threat‑hunting operations to identify potential compromises and undetected malicious activity.
- Integrate threat intelligence into SOC workflows and leverage intelligence to inform response and prevention strategies.
- Evaluate and optimise the client’s technology stack (SIEM, SOAR, EDR, threat intelligence platforms, etc.).
- Drive continuous improvement of detection rules, automation, and response capabilities.
- Recommend emerging tools and processes to enhance maturity.
- Conduct regular check‑ins, provide coaching and feedback, manage performance reviews and improvement plans, and support career development with team members.
- Serve as the main liaison between team members and ECS program management team, ensuring timely program and personnel updates and controlling quality on client deliverables.
- With the support of the Talent Acquisition team, participate in hiring processes ensuring team resourcing aligns with client expectations and program needs.
- Lead onboarding tasks (e.g., joiner tickets, scheduling, equipment, success plans), manage off‑boarding logistics and leaver tickets, and ensure operational continuity.
- Manage team schedules, approve PTO, ensure timesheet compliance, and maintain a consistent high‑quality service to the client.
- Working closely with the ECS program management team, align on overall program strategy and priorities to create clear, actionable team deliverables.
- 10‑12 years of experience in cybersecurity, cyber threat intelligence, or cyber security operations.
- Leadership experience in a threat intelligence environment a plus.
- Ability to distil highly technical information into more business‑centric, risk‑oriented language for presentation to senior leadership.
- Experience with Splunk (or other event monitoring capability), Crowd Strike, Recorded Future, MS Sentinel, Sentinel One, OpenCTI, MISP, Proofpoint.
- Deep knowledge of incident response, digital forensics, malware analysis, and threat intelligence.
- Hands‑on experience with SOC technologies such as SIEM, SOAR, EDR, IDS/IPS, and log management tools.
- Strong understanding of MITRE ATT&CK framework, NIST Cybersecurity Framework, and industry best practices.
- Excellent leadership, communication, and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).